- Spring 2017 edition of the Cyber Security Review is now available
March 31, 2017
We are pleased to inform you that Spring 2017 edition of the Cyber Security Review is now available. Please view contents here or subscribe. We would like to thank all organisations and authors of the articles for their support and contribution to the publication. We hope you find this edition of the Review useful and informative and look forward to receiving your ...
- German military to unveil new cyber command as threats grow
March 30, 2017
Germany’s military will launch a cyber command next week as part of an effort to beef up online defenses at a time when German spy agencies are warning of increasing cyber attacks by Russia. The German military remains a high-value target for hackers, with some 284,000 complex and professional would-be attacks registered in the first nine ...
- Ghana to set up national cyber security council
March 30, 2017
Ghana is to establish a national cyber security council to tackle the increasing rate of cyber crime in the country. The initiative is part of the government’s effort to build a comprehensive cyber security governance arrangement involving all key public and private sector stakeholders. The National Cyber Security Council will be an independent advisory body made ...
- Espionage Group Turla Tweaks Carbon Backdoor Malware with New Variants
March 30, 2017
Russian espionage group Turla has been working on various tools for years, including several new versions of Carbon, a second stage backdoor malware. The discovery was made by researchers from ESET who claim that this malware is still under active development. Since the group is well known for changing its tools once they are exposed, it’s ...
- IDEF’17 Will Open the Door Under the Auspices of The Presidency of the Republic of Turkey
March 30, 2017
One of the most important organization of Tukey, IDEF 13thInternational Defence Industry Fair will be held under the auspices of the Presidency of the Republic of Turkey and hosted by the Ministery of National Defence and under the management and responsibility of Turkish Armed Forces Foundation. IDEF which will be organized between May 09-12, 2017 at ...
- Banking Malware Source Code Leaked by Author to Gain Credibility Among Hackers
March 29, 2017
The source code for a new Trojan called Nuclear Bot has been leaked online, which may spark a rise in attacks against banking services. As it happens almost every time the source code for a malicious program lands online, it is quite likely to see more unskilled cybercriminals launching malware attacks against users. Nuclear Bot first landed ...
- The WikiLeaks Hacking Dump Exposed a Big Disconnect Over Cyber Security
March 29, 2017
When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems swung into action. The WikiLeaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco’s ...
- Credit card details and passwords of MILLIONS of users have been leaked online by Microsoft’s Docs.com
March 28, 2017
Credit card details, passwords and social security numbers are just some of the highly sensitive documents leaked by an online sharing site. Computer security researchers have revealed that Microsoft’s Docs.com is automatically sharing data – which users believed they were distributing privately among colleagues – with the public. Anyone using the site’s search engine can access this ...
- Apple Fixes 223 Vulnerabilities Across macOS, iOS, Safari
March 28, 2017
Apple fixed hundreds of bugs, 223 to be exact, across a slate of products including macOS Sierra, iOS, Safari, watchOS, and tvOS on Monday. More than a quarter of the bugs, 40 in macOS Sierra, and 30 in iOS, could lead to arbitrary code execution – in some instances with root privileges, Apple warned. The lion’s share of ...
- Laptops With More than 3.7 Million Hong Kong Voters’ Data Stolen
March 28, 2017
The Registration and Electoral Office of Hong Kong has reported the disappearance of two laptop computers after the chief executive election. The laptops contained around 3.7 million city’s voters personal information that could be compromised after the one of the most significant, if not the biggest ever data breaches in Hong Kong. The information that was ...
- Nato to spend £2.6 billion on satellites, cyber security and drones
March 27, 2017
Nato will announce plans to spend €3bn (£2.6bn) on upgrading its satellite and computer technology over the next three years, a senior official has said. As the alliance adapts to new types of warfare it hoped the technology will deter hackers, as the North Atlantic Treaty Organisation (Nato) acknowledges conflicts are increasingly fought out online rather than in the air, on land or at sea. The ...
- New Clues Surface on Shamoon 2’s Destructive Behavior
March 27, 2017
Researchers on Monday reported progress in piecing together some of the missing pieces of the Shamoon 2 puzzle that have been eluding them when it comes to lateral network movement and execution of the Disttrack malware component used in past campaigns. Shamoon 2 uses a combination of legitimate tools, such as the open source utility PAExec, and ...
- Germany Fought Off Two Fancy Bear Cyber Attacks in 2016
March 27, 2017
Fears about Russian involvement in European elections, especially after last year’s US election, aren’t exactly unfounded or born out of paranoia. In fact, Germany says it fended off two cyber attacks coming from the same cybercriminals that targeted Hillary Clinton’s campaign. Arne Schoenbohm, a top German official, told Reuters they managed to fight off two attacks ...
- Symantec API Flaws reportedly let attackers steal Private SSL Keys and Certificates
March 27, 2017
A security researcher has disclosed critical issues in the processes and third-party API used by Symantec certificate resellers to deliver and manage Symantec SSL certificates. The flaw, discovered by Chris Byrne, an information security consultant and instructor for Cloud Harmonics, could allow an unauthenticated attacker to retrieve other persons’ SSL certificates, including public and private keys, ...
- Internet-Connected Medical Washer-Disinfector Found Vulnerable to Hacking
March 27, 2017
Internet-of-Things devices are turning every industry into the computer industry, making customers think that their lives would be much easier with smart devices. There are, of course, some really good reasons to connect certain devices to the Internet. For example, remotely switching on your A/C a few minutes before you enter your home, instead of leaving ...
- Ex-cyber security chief says Government is ‘using’ Westminster attack to grab unnecessary spying powers
March 27, 2017
The Ministry of Defence’s former cyber security chief has accused the Government of trying to “use” the devastating Westminster attack to grab unnecessary and intrusive surveillance powers. Major General Jonathan Shaw said ministers were attempting to “use the moment” to push for security services having more control, despite there being only a weak case for it. Home Secretary Amber Rudd ...
- How CISOs Can Create A Balanced Portfolio Of Cybersecurity Products
March 26, 2017
We’re entering a world of deepening complexity and far vaster breadth when it comes to security for the modern enterprise. With companies integrating legacy data centers, manufacturing facilities, and networks with the cloud and the Internet of Things (IoT), all connecting to an uncontrollable mass of independently governed endpoints, CIOs and CISOs face a constant ...
- Indian Startup Develops a Next-Gen Cybersecurity Solution on the Blockchain
March 26, 2017
A new innovative prototype startup powered by blockchain technology for cybersecurity has recently launched in India aimed at curbing the global phenomenon of cybercrime. Mumbai-based Block Armour was thought up by Narayan Neelakantan, former CISO and Head of IT Risk and Compliance with India’s National Stock Exchange (NSE) and Floyd DCosta, who has a background in ...
- US Critical Infrastructure Cybersecurity Milestone
March 25, 2017
Last week the Idaho National Laboratory (INL) and the Department of Homeland Security (DHS) announced the successful completion of the 100th iteration of the Industrial Control Systems Cybersecurity training on defending systems used across the critical infrastructure sectors. Since April 2007, over 4,000 cybersecurity professionals have participated in the advanced course. These professionals represent all ...
- Jefferies Has 4 Cybersecurity Stocks to Buy as Growth to Continue for Years
March 24, 2017
Just a few short years ago, cybersecurity was the hottest of red-hot tech sectors and we covered the top companies seemingly all the time. Scorching hot initial public offerings had lots of investors, especially the fast-money type, going all in here. Then suddenly, things slowed to a crawl. The hot IPOs crashed, and the huge ...